Abstract
RFID today is the popular wireless induction system. Each RFID tag in RFID system is given a unique ID (UID). The RFID tag with memory also records the on demand information. When an independent RFID tag approaches the RFID antenna, the induction between tag and antenna happens. The information and content recorded in the tag is transmitted to the RFID antenna and translated into the computational data. Following up the data translation, the tag recognition can be completed and related applications are provided. Due to the popularity of RFID, many applications based on the local or small area were proposed. According to the short-distance wireless signal, the RFID tag users can be monitored within the specific area. In other words, the RFID systems are generally used to be the hardware identification in many applications. Most of these applications are based on the indoor environments or be a tiny area service and independent of the existed system. Some of the RFID systems were proposed to be used in hospital or health care (Munoz et at., 2003). Each patient is given and equipped the designed RFID tag. In addition, each patient should always wear every time and everywhere. Therefore, all the patients’ current location and conditions are monitored by the hospital. Some entrance guard systems are also based on RFID system. The RFID ticket or RFID card [5-7, 12] (Pala & Inanc, 2007) is used to identify that a user is legal or not. In addition, since the RFID tag can be used as the identification, it means that the applications which adopt software encryption as the identifications to protect the intellectual property of the applications or files can also use the RFID tag. Some researches presented that the embedding RFID can be plugged into a small device such as handheld host [1]. The handheld device users can plug in the SD or CF interface of RFID reader card. Hence, the users can scan and induct the RFID tag everywhere. Since the RFID systems are popular and ripe for distinguishing treatment of individual target [8,9], the unique characteristic or identification of RFID can be the solution of intellectual property protection. Many researches proposed the possible way to protect the intellectual property, products, or applications. In some applications [10], the RFID chips are embedded in the cap of bottle. The medicine or other objects can be differentiated between fake and true (Jian et at., 2009). However, there are many RFID related products. To manage the RFID information from different RFID products and the communication with different applications will be the important issue.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.